01642 06 11 11 Arrange Call

Arbitrary Code Execution via Crafted Serialized .NET Object in Rackspace Openstack Windows Guest Agent

CVE-2013-6795 · HIGH

CVE-2013-6795

The Updater in Rackspace Openstack Windows Guest Agent for XenServer before 1.2.6.0 allows remote attackers to execute arbitrary code via a crafted serialized .NET object to TCP port 1984, which triggers the download and extraction of a ZIP file that overwrites the Agent service binary.

Learn more about our Cis Benchmark Audit For Server Software.